Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 4 Apr 2005 14:52:09 +0200 (CEST)
From:      Svein Halvor Halvorsen <svein-freebsd-questions@theloosingend.net>
To:        =?ISO-8859-1?Q?Erik_N=F8rgaard?= <norgaard@locolomo.org>
Cc:        FreeBSD Questions <freebsd-questions@freebsd.org>
Subject:   Re: ssh key fingerprints
Message-ID:  <20050404145001.R71005@maren.thelosingend.net>
In-Reply-To: <42512CD2.6080006@locolomo.org>
References:  <42512CD2.6080006@locolomo.org>

next in thread | previous in thread | raw e-mail | index | archive | help
  This message is in MIME format.  The first part should be readable text,
  while the remaining parts are likely unreadable without MIME-aware tools.

--0-1174496699-1112619129=:71005
Content-Type: TEXT/PLAIN; charset=ISO-8859-1
Content-Transfer-Encoding: QUOTED-PRINTABLE


* Erik N=F8rgaard [2005-04-04 14:02 +0200]
>  How do I see the fingerprints of my ssh keys, both user and host keys?

Excerpt from man ssh-keygen(1)

SYNOPSIS
     ssh-keygen -l [-f input_keyfile]

     -l      Show fingerprint of specified public key file.  Private RSA1 k=
eys
             are also supported.  For RSA and DSA keys ssh-keygen tries to
             find the matching public key file and prints its fingerprint.


--0-1174496699-1112619129=:71005--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050404145001.R71005>